RussianPatents.com
|
User identification method |
||||||||||||||||||||||
IPC classes for russian patent User identification method (RU 2385233):
|
FIELD: physics, computer engineering. SUBSTANCE: method of identifying a user by using a PIN code involves assigning the user with a unique number for accessing an identification system. A PIN code table corresponding to the said unique number is created and the unique number and PIN code table are stored by both parties. PIN codes are read by the user from the table and the PIN code is sent to the identification system where the incoming PIN code is compared with the PIN code stored in the identification system with output of a control solution. Columns and rows of the table are assigned indices, with possibility of unambiguous determination of any cell of the PIN code table as a set of indices of intersecting elements of the table, where the indices are displayed in random order. A single character is randomly placed into each cell of the table. The user and the identification system assume the same order of reading characters from the PIN code table, beginning with the character indicated in given cell of the PIN code table. First, the user enters the identification system by entering the unique number and if such a unique number is available in the memory of the identification system, the identification system responds by randomly selecting a cell of the PIN code table and determines the set of indices of the elements of the table at whose intersection lies the cell and sends that set of indices to the user. The said user uses the set of indices on their copy of the PIN code table, finds the cell containing the first PIN code character and, using the received order of reading characters from the PIN code table, identifies the rest of the cells containing the rest of the PIN code characters. Further, the user enters the obtained PIN code or list of cells of the table containing PIN code characters into the identification system which compares the obtained PIN code with the PIN code obtained inside the identification system from the PIN code table stored in it in accordance with the received order of their reading. If the entered PIN code coincides with that obtained inside the identification system, the latter confirms successful user identification. If the entered PIN code does not coincide with that obtained inside the identification system, the latter carries out an action assigned by the corresponding program, e.g. switches on an alarm signal or blocks the user with the given unique number for a certain time. EFFECT: increased security of the procedure of entering a PIN code owing to encoding, with easier manufacture of PIN cards. 5 cl, 1 dwg
The invention relates to a method for remote identification of the users of the automated payment networks using PIN codes. A known method of identifying the user using the identification PIN code, including the formation of a payment card, which is applied to the nominal value, subject to debit the card until it is reset, the identification number to log in to the write-off amount, as well as do areas with drawing pins, each of which corresponds to a certain the amount to charge, covering the opaque easily deformable film or coating, deposited in the payment system of the individual number cards with a list of PIN codes and corresponding of amounts written off, while in the process of identifying remove the cover and read the PIN code, which corresponds to the fixed part of the value is the resolution on the cancellation of this fixed part of the data PIN and ID number the user enters in system identification, which it compares with the PIN code stored in a memory of the payment system, and with the concurrence of the entered PIN one identification system confirms the successful identification of the user, and if there is no match, the authentication system performs the action prescribed in the relevant program is Moi, for example includes alarm (FR, application 2747962, B42D 15/10, 1997). The disadvantage of this solution is the size of a credit card depends on the number of sites and the size of fixed amounts under each PIN (with increase of the nominal dimensions of the card are greatly enhanced), which is inconvenient to the user, while increasing the size of the fixed amounts under each PIN with fewer stations, convenience card only shows up when making large cash purchases. Wasteful use of the surface of the small size of a credit card of this type prevents saturation of the sites with the proper number of pins, enough to produce as small payments, and large. In addition, the loss of the card requires a prompt cancellation, because the PIN code operation is routine and is not encoded. There is also known a method of identifying the user using the identification PIN code, including assigning a user to an individual for access authorization and identification, generation of the table of the PIN corresponding to that individual number storage at both sides of the private rooms and tables PIN codes, read user PIN codes from the table, the transfer PIN in the identification system, comparing the received PIN code stored in the system ID is tificatio, with development control decisions (see EN 2183563, B42D 15/10, G07F 19/00, 2001). The method differs from the above mentioned fact that the map additionally supply the unique ID of the response of the payment system, placed in the same cell of the table is the PIN next to each of them, as before the procedure debit card, the user compares the received response code recorded in the cell with the entered PIN code. The method extends the solvency of the credit card and eliminates unauthorized write-off of amounts the system, not a credit structure that issued the card. The disadvantage of this solution is realized using to send the PIN code from the user to the remote system channel with a low degree of protection. In this case, there is a significant probability of intercept PIN attackers. Gaining access to other people's PIN code allows you to access other people's personal records, correspondence, to make unauthorised transactions on behalf of or to paralyze business processes. This, in turn, leads to lower trust users to remote systems, creates fertile ground for computer crimes. The objective of the invention is the provision of a higher degree of security procedures for entering the PIN code. Technical result achieved when solving a task, expressed as the increase in the idenote procedure enter the PIN code when using open lines of communication through coding. In addition, simplifies the manufacture of the PIN card (there is no need to apply a protective coating). To solve the task the user authentication method to use to identify the PIN code, including assigning a user to an individual for access authorization and identification, generation of the table of the PIN corresponding to that individual number storage at both sides of the private rooms and tables PIN codes, read user PIN codes from the table, the transfer PIN in the identification system, comparing the received PIN code stored in the identification system for generating a control solution, characterized in that the columns and lines of the table designated by numbers that uniquely identify each cell of the table PIN codes as a set of overlapping indexes of table entries, the index of the display in a random order, in addition, the table cells are placed randomly on one character, the user and the authentication system will accept the same procedure reads characters from a table, PIN-codes, which begin from the character specified in the specified cell of the table PIN first user by entering the individual is included in system identification, that if such individual is the real numbers in its memory in response randomly selects a cell of the table PIN and determines the set of indices of elements of the table at the intersection of which lies cell, and transmits the set of indexes to the user who is using them on his table instance PIN finds the cell that contains the first character of the PIN and, using the accepted procedure reads characters from the table the PIN identifies the remaining cells containing symbols PIN, then the PIN code or a list of cells table containing the symbols of the PIN, the user enters the identification system, which compares the received PIN with the PIN received within the identification system, stored in table PIN, in accordance with accepted order they are read, with the concurrence of the entered PIN is received within the identification system, the latter confirms the successful identification of the user, if not entered a PIN received within the identification system of the latter performs the action specified by the respective program, for example, includes alarm or blocking user with the given individual number for a certain time. In addition, the number of columns and rows in the table randomly and not less than 4. In addition, if for indexing one group of table items PIN-codes use letters, for indexing the second group of elements used numbers. In addition, use random paradisecasey alpha or numeric indices of the columns and rows of the grid PIN. In addition, the adopted procedure reads characters from a table PIN includes a number of input symbols and/or procedure reads characters from cells, for example, "top-down" or "right to left", etc. Comparative analysis of the essential features of the proposed solution with essential features analogs and prototypes demonstrate compliance of the proposed technical solutions to the criterion "novelty". While the signs of the distinctive part of the formula of the invention provides a solution to the following tasks. The signs of the columns and lines of the table designated by numbers that uniquely identify each cell of the table PIN as a set of overlapping indexes of table elements" allow in process of transfer current PIN code, the user is not its real content, and the code indicating the indexes (characters)assigned to the intersecting rows and columns of the table PIN, thereby to determine the first character PIN code, which provides the first level of encryption. In addition, there is no opportunity for third parties to identify already "used" PIN-codes (which erased the protective coating). Signs indicating that the index display in random order" exclude recovery table PIN-codes for "eavesdropping" multiple pin codes. Signs indicated Yausa, what in the cells of the table are placed randomly on one symbol, prevent the restoration of the contents of the table PIN when you try it "hacking" and, in addition, provide an opportunity for character formation of PIN-code, which when given order reading symbols from table PIN (for example, the transition from one cell of the table to another, or variations in the number of characters in the PIN code) provides an additional level of encryption. In addition, the same symbols table can repeatedly be read in the composition differing from each PIN that eliminates the protective opaque coating and increases the "capacity" of the table. Signs of the user and the authentication system will accept the same procedure reads characters from a table, PIN-codes, which begin from the character specified in the specified cell of the table PIN" provide the possibility of multiple reading of the same characters from the table PIN in the composition differing from each PIN that provides an additional level of encryption. The signs of the first user by entering the individual is included in the identification system, which in the presence of such individual numbers in its memory in response randomly selects a cell of the table PIN determines at what the PR index table entries, at the intersection of which lies cell, and transmits the set of indexes, the user provides the user receiving a coded indication of the actual PIN code for confirmation of the last access to the system identification. Signs indicating that the user using the set of indexes on your table instance PIN, finds the cell that contains the first character of the PIN and, using the accepted procedure reads characters from a table PIN, reveals its cells containing symbols PIN" provide "restore the PIN code by the user according to encoded instructions for system identification. Signs "then received a PIN code or a list of cells table containing the symbols of the PIN, the user enters the identification system, which compares the received PIN with the PIN received within the system identification, stored in the table PIN in accordance with the accepted order in which they read" provide the ability to identify the PIN code entered by the user, with the input of a list of cells of the table (i.e. the set of indices of the intersecting table elements forming these cells) also provides additional protection of the transmitted PIN code. Signs "when matching the entered PIN-code with the received inside the system identification latter confirms the successful identification of the user, if not entered a PIN received within the identification system of the latter performs the action specified by the respective program, for example, includes alarm" describe the possible reaction system identification entered into the user PIN code. Signs of the second paragraph of formula increase the "capacity" of the table by the number of pins and increase their security in case of loss of the latter. The signs of the third claim of the invention increase the unambiguous decoding of the set of indexes. The signs of the fourth claim of the invention increase the security table PIN-codes. The signs of the fifth paragraph of the claims disclose the concept of "order of reading characters from a table PIN". The drawing shows a variant of the table PIN. The claimed method is implemented using the card, which is applied to the image table PIN 1, row 2 and columns 3 which are indicated by indexes 4 and 5, with the ability to uniquely identify each cell of the table PIN as a set of overlapping indexes of table elements, i.e. column 3 and row 2. For material used for foundations and external forms of this card is no different from any other card that contains the PIN codes. Fundamentally there is no limitation to use as material CT is s plastic, thick cardboard or metal plate (steel, aluminum, other alloys). If the index 5 to index one group of table items PIN-codes (column 3) use letters as index 4 to index the second group of elements (rows 2) it is advisable to use mathematical symbols preferred numbers. Although you can use for these purposes alphabetical index (it is important that the letters are used to denote the rows that do not match the letters used to indicate the columns). The order, alphabetic or numeric indices of the columns and rows of the grid PIN is arbitrary, i.e. if we are talking about the letters, they are not in alphabetical order (for example, A, C, E, G, B, H, D, F...Y), if we are talking about numbers, they are not in ascending order or descending order (for example, 1, 3, 6, 2, 9, 7, 4, 5, 8, 0...X), here X and Y, the number of elements table PIN (columns and rows) is any integer greater than four. X and Y may be equal (table square), and not equal to each other (table rectangular). The alphabet, which are letters, or writing numbers can be anything, but be sure that they are clearly understandable to the user. In addition, the characters contained in the cells, must be entered when using a standard keyboard, a well-known com is cationic devices ensure the development of information packages used for remote exchange (transfer) of information appropriate for the purposes of the transfer PIN. In the table cells are placed randomly on one character (letter or digit or otherwise). You can also use empty cells in the table. Reading order of the empty cells is determined by the adopted procedure reads characters from a table, PIN-codes, including the number of input symbols (3-10 etc) and "trajectory" move through the cells of the table that defines the sequence of "connections" character in the PIN. Reading symbols from table PIN start from the character specified in the specified cell of the table PIN. The following trails further movement of the table cells: left, right, up-down, up-right diagonal up-left diagonal down-right diagonal down-left diagonal. When the PIN code can be read out in a spiral to the right or left. It is advisable for each variant of the procedure read (path move through the cells of the table) be assigned a code number or letter, specifying the order of instructions in the information units exchanged between the user and the system identification. It is also advisable reading order can change with each session, identify the purpose. Thus, depending on the specific procedure reads characters from a table PIN one and the same symbol of one cell can be used in the various pins on a card the size of a pocket calendar is placed not less than 2400 PIN codes. The claimed method is implemented as follows. The user contacts the organization, such as a credit, where it is assigned a unique number to access the system identification of the organization and issue a card with a picture of the table PIN corresponding to that individual number and order code reading. This information is passed to the memory identification system organization and stored over the period of use of the card, as well as data describing the table PIN. The user also stores individual card number, instance granted table PIN codes and procedure(s) reading tables PIN-codes. When authentication is required, for example to access the payment system, the user enters in the system identify its individual number. The identification system searches its memory such individual number. In case of negative result of the search (no memory of such number) identification system terminates the interaction with the user, informing him of the error, and if the result is positive, p is the claim identification system prepares a request to the user arbitrarily selects a cell of the table PIN, containing the first character PIN, determines the set of indices of elements of the table, at the intersection of which lies the cell, and determines the order of reading the PIN code and the code of this procedure). Further, the identification system passes this set of indices (identifying the cell PIN code) and the code of procedure for reading the PIN code to the user. The user, using these data in their table instance PIN finds the cell that contains the first character of the PIN and, using accepted in this case, the procedure reads characters from a table PIN, reveals the rest of its cells containing symbols PIN. Then received a PIN code or a list of cells table containing the symbols of the PIN (it all depends on the adopted system Protocol and its interaction with the user), the user enters the identification system, which compares the received PIN code (or restored it passed by the user to the list of cells of the table) PIN received within the identification system, stored in its memory table PIN, in accordance with the decision taken in this case the order they are read. Further, when matching the entered PIN-code (or restored according to the data obtained from the user) are obtained within the identification system confirms the last successful user authentication. When nesovpaden and entered the PIN code (or restored according to received from the user) are obtained within the identification system performs the last action prescribed for her by a corresponding program, for example, includes alarm and/or stops the interaction with the user. After a certain period of time or limit the number of transactions, and also wishes card containing a code table, replaced by a new one. This protects you from full disclosure of the content code table, even if attackers are able to intercept all used to this user PIN codes. The new card to the user can be transmitted in the form of an image that is encrypted in a known manner (PGP and the like), from the operator system to the user personally or be sent by post in sealed form. The present invention is industrially applicable as it does not require for its use of special technologies, except those that are currently used in the manufacture of, for example, plastic credit cards or pocket calendars. 1. The user authentication method to use to identify the PIN code, including assigning a user to an individual for access authorization and identification, formation table PIN corresponding to this private room is, storage at both sides of the private rooms and tables PIN codes, read user PIN codes from the table, the transfer PIN in the identification system, comparing the received PIN code stored in the identification system for generating a control solution, characterized in that the columns and lines of the table designated by numbers that uniquely identify each cell of the table PIN-codes, as the set of indexes of the intersecting elements of the table, the index of the display in a random order, in addition, the table cells are placed randomly on one character, the user and the authentication system will accept the same procedure reads characters from a table, PIN-codes, which begin from the character specified in the specified cell of the table PIN at the beginning of the user by entering the individual is included in the identification system, which in the presence of such individual numbers in its memory in response randomly selects a cell of the table PIN and determines the set of indices of elements of the table, at the intersection of which lies cell, and transmits the set of indexes to the user who is using them on his table instance PIN finds the cell that contains the first character of the PIN and, using accepted order reading symbols from table PIN to the s, identifies the remaining cells containing symbols PIN, then the PIN code or a list of cells table containing the symbols of the PIN, the user enters the identification system, which compares the received PIN with the PIN received within the system identification, stored in the table is the PIN in accordance with the order they are read when matching the entered PIN is received within the identification system, the latter confirms the successful identification of the user, if not entered a PIN received within the identification system performs the last action prescribed in the relevant the program, for example, includes alarm or blocking user with the given individual number for a certain time. 2. The method according to claim 1, characterized in that the number of columns and rows in the table randomly and not less than 4. 3. The method according to claim 1, characterized in that if for indexing one group of table items PIN-codes use letters, for indexing the second group of elements used a number. 4. The method according to claim 1, characterized in that use arbitrary order, alphabetic or numeric indices of the columns and rows of PIN-codes. 5. The method according to claim 1, characterized in that the adopted procedure reads characters from a table PIN Kodo, which includes the number of input symbols and/or reading symbols from its cells, carried out for any movement.
|
© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English. |